<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ThreatConnect</title>
	<atom:link href="https://threatconnect.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatconnect.com/</link>
	<description>Smarter Security for Maximum Impact</description>
	<lastBuildDate>Mon, 09 Mar 2026 16:32:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Iranian Conflict Intelligence Dashboard Immediately Available for ThreatConnect</title>
		<link>https://threatconnect.com/blog/iranian-conflict-intelligence-dashboard-immediately-available-for-threatconnect/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[Dashboards]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=21104</guid>

					<description><![CDATA[<p>The escalation of geopolitical tensions specifically focused on the Iranian Conflict over the last days of February 2026 has intensified the significant cyber and physical security risks to organizations globally.  With threat activity emanating from advanced Iranian state-sponsored actors, aligned hacktivist collectives, and opportunistic criminal groups, security teams must remain agile, informed, and proactive.  The [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/iranian-conflict-intelligence-dashboard-immediately-available-for-threatconnect/">Iranian Conflict Intelligence Dashboard Immediately Available for ThreatConnect</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The escalation of geopolitical tensions specifically focused on the Iranian Conflict over the last days of February 2026 has intensified the significant cyber and physical security risks to organizations globally. </span></p>
<p><span style="font-weight: 400;">With threat activity emanating from advanced Iranian state-sponsored actors, aligned hacktivist collectives, and opportunistic criminal groups, security teams must remain agile, informed, and proactive. </span></p>
<p><span style="font-weight: 400;">The Iranian Conflict Intelligence Dashboard has been updated to equip defenders with timely, high-fidelity intelligence that specifically reflects the dynamic threat environment shaped by this high-profile regional conflict with a heightened focus on Iran-linked activity.</span></p>
<p><span style="font-weight: 400;">Key Threat Actor Groups &amp; Campaign Themes Tracked Include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>IRGC-affiliated Cyber Units (e.g., APT33, APT34, APT39, APT42):</b><span style="font-weight: 400;"> Tracking activity from primary state-sponsored groups.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Proxies and Ideological Hacktivist Actors:</b><span style="font-weight: 400;"> Monitoring activity from groups like </span><b>CyberAv3ngers, APT IRAN, Handala Hack, Lulzsec, Dark Storm Team, GhostSec, Cyber Islamic Resistance,</b><span style="font-weight: 400;"> and others aligned with </span><b>Iranian</b><span style="font-weight: 400;"> strategic interests.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Coordinated Influence and Disinformation Campaigns.</b></li>
<li style="font-weight: 400;" aria-level="1"><b>OT and Critical Infrastructure Targeting Efforts, particularly those targeting Israeli and Western assets.</b></li>
</ul>
<p><span style="font-weight: 400;">Rather than tracking isolated threats, the –Iranian Conflict Intelligence Dashboard dashboard provides strategic context and operational detail across the broader cyber conflict spectrum, enabling faster detection, response, and mitigation.</span></p>
<h4><b>Key Benefits:</b></h4>
<ul>
<li><b>Conflict-Centric Intelligence Aggregation</b><span style="font-weight: 400;"> &#8211; Centralized indicators of compromise (IOCs), TTPs, and threat insights related to Iranian-linked campaigns, sourced from open source intelligence (OSINT), premium threat feeds, and internal telemetry.</span></li>
<li><b>Live Threat Environment Tracking</b><span style="font-weight: 400;"> &#8211; Monitors shifts in activity across major adversary groups, cyber incidents, defacements, DDoS campaigns, and geopolitical events fueling escalation.</span></li>
<li><b>Accelerated Incident Response</b><span style="font-weight: 400;"> &#8211; Enriched and correlated intelligence to support triage, prioritization, and response activities during periods of elevated tension or retaliatory operations.</span></li>
<li><b>Custom Visualization &amp; Analysis</b><span style="font-weight: 400;"> &#8211; Interactive dashboards featuring timeline analysis, actor overlap matrices, infrastructure clustering, and geographic threat origination maps.</span></li>
<li><b>ThreatConnect Automation Integration</b><span style="font-weight: 400;"> &#8211; Seamless correlation with existing ThreatConnect adversary profiles, intrusion sets, and signature-based alerts to identify high-risk overlaps with organizational environments.</span></li>
</ul>
<p><b>Leveraging this dashboard allows security teams to anticipate conflict-related threats, understand attacker motivations, and tailor defenses to emerging risks as the Iranian cyber conflict evolves.</b></p>
<p><b>Specific Intelligence Focus: Iranian Malware List</b></p>
<ul>
<li><b>APT42: </b><b>tamecat</b><b>, </b><b>tabbycat</b><b>, </b><b>vbrevshell</b><b>, </b><b>powerpost</b><b>, </b><b>brokeyolk</b><b>, </b><b>chairsmack</b><b>, </b><b>asyncrat</b></li>
<li><b>APT34: </b><b>powbat</b><b>, </b><b>powruner</b><b>, </b><b>bondupdater</b></li>
<li><b>APT33: </b><b>shapeshift</b><b>, </b><b>dropshot</b><b>, </b><b>turnedup</b><b>, </b><b>nanocore</b><b>, </b><b>netwire</b><b>, </b><b>alfa shell</b></li>
<li><b>Other Related Malware: </b><b>Gh0st Rat</b><b>, </b><b>quasarrat</b><b>, </b><b>amadey</b><b>, </b><b>bittersweet</b><b>, </b><b>cointoss</b><b>, </b><b>lateop</b></li>
</ul>
<p><b>Specific Intelligence Focus: Iranian ICS Targets</b></p>
<p><b>ICS Systems Likely to be targeted by Iranian threat actors (based on analysis like the Censys report):</b></p>
<ul>
<li aria-level="1"><b>&#8220;Unitronics&#8221; or (&#8220;Vision&#8221; AND (PLC OR HMI))</b></li>
<li aria-level="1"><b>&#8220;Tridium&#8221; or &#8220;Niagara&#8221;</b></li>
<li aria-level="1"><b>&#8220;Orpak&#8221; or &#8220;SiteOmat&#8221;</b></li>
<li aria-level="1"><b>&#8220;red lion&#8221;</b></li>
</ul>
<p><b>Dashboard Components Include:</b></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Indicators linked to state-sponsored and proxy cyber operations.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Threat groups aligned to Iranian strategic cyber interests.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reports and advisories referencing the conflict, regional escalations, or actor-attributed activity.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Campaign tracking with attribution timelines, victimology insights, and strategic objectives.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">MITRE ATT&amp;CK techniques used by affiliated groups, mapped to known incidents.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Keyword and tag intelligence trends across conflict-related reporting.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Infrastructure associations (e.g., shared IPs, domains, malware hashes).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Actor and alias mapping, including cross-reference to public and private sector intelligence.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Vulnerabilities linked to recent Iran intelligence activity.</span></li>
</ol>
<p><b>Screen Capture of Iranian Conflict Intelligence Dashboard</b></p>
<div id="attachment_21107" style="width: 1034px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-21107" class="wp-image-21107 size-large" src="https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard-1024x595.png" alt="" width="1024" height="595" srcset="https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard-1024x595.png 1024w, https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard-300x174.png 300w, https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard-768x446.png 768w, https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard-1536x892.png 1536w, https://threatconnect.com/wp-content/uploads/2026/03/iranian-conflict-dashboard.png 1999w" sizes="(max-width: 1024px) 100vw, 1024px" /><p id="caption-attachment-21107" class="wp-caption-text">Lead Contributor – Adrian Dela Cruz , Customer Success Engineer</p></div>
<p><em><b><i>To gain access to the Iranian Conflict Intelligence Dashboard, please reach out to your Customer Success team </i>or reach out to us through our <a href="https://threatconnect.com/contact/" target="_blank" rel="noopener">contact form</a>.</b></em></p>
<p><b><i>The dashboard is also </i></b><a href="https://github.com/ThreatConnect-Inc/threatconnect-dashboards/blob/main/Iranian_Threat%20Actor%20Overview.tdb" target="_blank" rel="noopener"><b><i>available here</i></b></a><b><i>, and can be added manually to your ThreatConnect instance.<br />
</i></b></p>
<p>The post <a href="https://threatconnect.com/blog/iranian-conflict-intelligence-dashboard-immediately-available-for-threatconnect/">Iranian Conflict Intelligence Dashboard Immediately Available for ThreatConnect</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>From Noise to Signal: Crafting TI-Informed Detections for Real Security Value</title>
		<link>https://threatconnect.com/blog/from-noise-to-signal-crafting-ti-informed-detections-for-real-security-value/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[ThreatConnect Platform]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=21077</guid>

					<description><![CDATA[<p>A Practical Guide for MSSPs to Turn Alert Noise into Defensible Security Outcomes Managed Security Service Providers (MSSPs) generate an enormous volume of alerts every day. Yet many MSSP customers still ask the same question: “What did this actually protect us from?” This gap between alert activity and perceived security value has become one of [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/from-noise-to-signal-crafting-ti-informed-detections-for-real-security-value/">From Noise to Signal: Crafting TI-Informed Detections for Real Security Value</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="font-size: 26px;"><b>A Practical Guide for MSSPs to Turn Alert Noise into Defensible Security Outcomes</b></h1>
<p><span style="font-weight: 400;">Managed Security Service Providers (MSSPs) generate an enormous volume of alerts every day. Yet many MSSP customers still ask the same question: </span><b>“What did this actually protect us from?”</b></p>
<p><span style="font-weight: 400;">This gap between alert activity and perceived security value has become one of the biggest challenges facing modern MSSPs. As environments grow more complex and adversaries more targeted, detection strategies built on generic signals and static rules increasingly fall short.</span></p>
<p><span style="font-weight: 400;">The issue isn’t a lack of data. It’s a lack of context.</span></p>
<h3><strong>The Detection Value Gap Facing Modern MSSPs</strong></h3>
<p><span style="font-weight: 400;">Most MSSPs are not struggling because they lack detections. They’re struggling because those detections don’t consistently map to real-world risk.</span></p>
<p><span style="font-weight: 400;">Common symptoms of this include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">High alert volume with low investigative confidence</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">SIEM dashboards that show activity, but not threat intent</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Off-the-shelf threat intelligence feeds that surface indicators without explanation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Detection tuning performed without visibility into customer-specific threats</span></li>
</ul>
<p><span style="font-weight: 400;">In many cases, alerts fire without answering the questions customers care about most:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Who is likely behind this activity?</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Is this attacker relevant to my industry?</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Does this behavior indicate a real attack path?</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Why should this alert take priority over others?</span></li>
</ul>
<p><span style="font-weight: 400;">When those questions go unanswered, MSSPs end up delivering noise instead of signal — undermining trust and obscuring the true value of their services.</span></p>
<h3><strong>What is Threat Intelligence-Informed Detection?</strong></h3>
<p><span style="font-weight: 400;">Threat intelligence-informed detection is the practice of engineering and prioritizing security alerts based on a deep, systematic understanding of real-world adversary behavior.</span></p>
<p><span style="font-weight: 400;">Rather than relying on indicators — such as file hashes, domains, or IP addresses that attackers can quickly change — this approach focuses on the </span><b>Tactics, Techniques, and Procedures (TTPs)</b><span style="font-weight: 400;"> adversaries use to achieve their goals. While indicators expire, attacker behavior tends to remain consistent over time.</span></p>
<p><span style="font-weight: 400;">For MSSPs, this shift is critical. Customers don’t benefit from alerts that simply confirm </span><i><span style="font-weight: 400;">something happened</span></i><span style="font-weight: 400;">. They need detections that explain </span><i><span style="font-weight: 400;">what an attacker is trying to do</span></i><span style="font-weight: 400;">, </span><i><span style="font-weight: 400;">why it matters</span></i><span style="font-weight: 400;">, and </span><i><span style="font-weight: 400;">how likely it is to impact their environment</span></i><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Threat intelligence–informed detection prioritizes alerts that reflect real attacker intent, enabling MSSPs to deliver clearer signals, stronger prioritization, and more defensible security outcomes.</span></p>
<p><b>Traditional Detection vs. Threat-Informed Detection </b></p>
<table style="height: 330px; width: 100%; border-collapse: collapse; border-style: solid;">
<tbody>
<tr style="border-style: solid;">
<td style="width: 50%; height: 24px; border-style: solid; text-align: center;"><strong>Traditional Detection</strong></td>
<td style="width: 50%; height: 24px; border-style: solid; text-align: center;"><strong>Threat-Informed Detection</strong></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 50%; height: 48px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Reactive: Responds to any generic suspicious activity.</span></td>
<td style="width: 50%; height: 48px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Proactive: Engineers detections to stop known adversary methods.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 50%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Volume-Focused: Alerts on all known bad indicators (IOCs).</span></td>
<td style="width: 50%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Context-Focused: Alerts on high-fidelity behaviors tied to risk.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 50%; height: 48px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Tool-Centric: Relies on whatever rules come &#8220;out of the box.&#8221;</span></td>
<td style="width: 50%; height: 48px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Intelligence-Driven: Customizes rules based on current threat intel.</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p><b>The Threat-Informed Detection Operating Model</b><br />
<span style="font-weight: 400;">In practice, threat intelligence–informed detection relies on a structured operating model that connects intelligence, detections, and validation.</span> <span style="font-weight: 400;">Most threat-informed detection programs use the </span><a href="https://attack.mitre.org/" target="_blank" rel="noopener"><span style="font-weight: 400;">MITRE ATT&amp;CK framework</span></a><span style="font-weight: 400;"> to map detection coverage against known adversary techniques.</span></p>
<p><span style="font-weight: 400;">This allows MSSPs to:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identify which attacker behaviors are covered</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Highlight gaps in detection</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Communicate detection strategy clearly to customers and stakeholders</span></li>
</ul>
<p><span style="font-weight: 400;">ATT&amp;CK provides a shared vocabulary that ties intelligence, detections, and reporting together.</span></p>
<h3><strong>Common Detection Methodologies Used by MSSPs</strong></h3>
<p><span style="font-weight: 400;">Most MSSPs rely on a combination of detection methodologies, each with distinct strengths and limitations.</span></p>
<p><b>Threat Intelligence–Informed Detection</b><br />
<span style="font-weight: 400;">TI-informed detection is anchored in adversary tradecraft and real-world TTPs. It’s proactively aligned to known attack patterns and enables clear prioritization and explanation of alerts. It’s advantageous for MSSPs, because it scales across customers while preserving contextual relevance.</span></p>
<p><b>Alert-Driven Detection</b><br />
<span style="font-weight: 400;">Alert-driven detection is triggered by individual events or signatures and is focused on incident response and alert closure. However, it provides limited visibility into attacker intent or campaign context — often results in high alert volume with inconsistent value.</span></p>
<p><b>Behavioral Detection</b><br />
<span style="font-weight: 400;">Behavioral detection identifies anomalies based on deviations from baseline behavior and is commonly powered by machine learning. It’s an effective methodology for unknown threats, but it can be difficult to explain and tune at scale.</span></p>
<p><b>Exposure-Led Detection</b><br />
<span style="font-weight: 400;">Exposure-led detection prioritizes structural weaknesses and misconfigurations by modeling potential attack paths and choke points. It’s a valuable methodology for prevention and risk modeling, but it’s less effective for detecting active adversary campaigns.</span></p>
<table style="height: 440px; width: 100%; border-collapse: collapse; border-style: solid;">
<tbody>
<tr style="border-style: solid;">
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><strong>Methodology</strong></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><strong>Focus</strong></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><strong>Approach</strong></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Threat-Informed</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Adversary TTPs</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Proactive; uses frameworks like MITRE ATT&amp;CK</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Alert-Driven</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Isolated signals</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Reactive; focuses on incident closure</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Behavioral</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Internal anomalies</span></td>
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Baseline-driven; uses ML to spot deviations</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; height: 25px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Exposure-Led</span></td>
<td style="width: 33.3333%; height: 25px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Structural weakness</span></td>
<td style="width: 33.3333%; height: 25px; border-style: solid; text-align: center;"><span style="font-weight: 400;">Logical; models paths and configuration &#8220;choke points&#8221;</span></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h3><strong>Why Threat-Informed Detection is the Most Effective Approach for MSSPs</strong></h3>
<p><span style="font-weight: 400;">Threat intelligence–informed detection is widely considered the gold standard for mature security programs because it aligns detection coverage with how breaches actually occur.</span></p>
<p><span style="font-weight: 400;">Key advantages include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Focus on tactics most commonly used against a given industry</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reduced noise through relevance-based prioritization</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Stronger links between detections and business risk</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">More defensible allocation of security resources</span></li>
</ul>
<p><span style="font-weight: 400;">For MSSPs, this approach ensures that time, tooling, and analyst effort are invested where they matter most — without overreacting or underinvesting.</span></p>
<h3><strong>Operationalizing Threat Intelligence–Informed Detections at Scale</strong></h3>
<p><span style="font-weight: 400;">To deliver threat-informed detections consistently, MSSPs need intelligence that is:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Curated, not raw</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Risk-weighted, not flat</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Tailored to each customer’s industry and environment</span></li>
</ul>
<p><span style="font-weight: 400;">This requires:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Feeding SIEMs with intelligence aligned to active adversary campaigns</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Maintaining consistent detection logic across customers</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Scaling personalization without increasing analyst workload</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Preserving clear explanations for every alert generated</span></li>
</ul>
<h3><strong>How ThreatConnect Enables Intelligence-Informed Detection</strong></h3>
<p><span style="font-weight: 400;">ThreatConnect helps MSSPs operationalize threat intelligence–informed detection by aligning intelligence, detections, and customer context.</span></p>
<p><span style="font-weight: 400;">With ThreatConnect, MSSPs can:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Deliver curated, risk-weighted indicators tailored to each customer</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Align SIEM detections with adversary TTPs and active campaigns</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Provide clear rationale behind every alert</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reduce irrelevant alerts while improving detection fidelity</span></li>
</ul>
<p><span style="font-weight: 400;">Rather than adding more data, ThreatConnect helps MSSPs deliver actionable intelligence that supports confident decisions.</span></p>
<p><b>MSSP Business Outcomes </b></p>
<ul>
<li><b>Reduce False Positives </b><span style="font-weight: 400;">— 43% information technology (IT) professionals say that more than </span><a href="https://www.securitymagazine.com/articles/97260-one-fifth-of-cybersecurity-alerts-are-false-positives" target="_blank" rel="noopener"><span style="font-weight: 400;">40% of their alerts are false positives</span></a><span style="font-weight: 400;">. Intelligence-informed detections reduce noise by prioritizing indicators tied to real attacker behavior.</span></li>
<li><b>Stronger QBR and Executive Conversations </b><span style="font-weight: 400;">— Demonstrate that you flagged an attack campaign targeting their industry, before impact.</span></li>
<li><b></b><b>Improved SIEM ROI </b><span style="font-weight: 400;">— Customers gain higher signal-to-noise ratios, greater confidence in detections, and clear evidence that their SIEM investment is delivering value.</span></li>
</ul>
<h3><strong>Moving from Alert Volume to Security Value</strong></h3>
<p><span style="font-weight: 400;">Detection effectiveness is no longer defined by how many alerts fire, but by how clearly those alerts map to real-world threats. Threat intelligence–informed detection allows MSSPs to prioritize the threats that matter most, communicate security value with clarity and confidence, and build long-term trust with customers.</span></p>
<p><span style="font-weight: 400;">For a deeper look at how modern MSSPs are scaling intelligence-driven services, explore </span><a href="https://threatconnect.com/resource/modern-mssp-services-powered-by-threatconnect/" target="_blank" rel="noopener"><span style="font-weight: 400;">Modern MSSP Services Powered by ThreatConnect</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://threatconnect.com/blog/from-noise-to-signal-crafting-ti-informed-detections-for-real-security-value/">From Noise to Signal: Crafting TI-Informed Detections for Real Security Value</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Prioritizing Vulnerabilities That Actually Matter</title>
		<link>https://threatconnect.com/blog/prioritizing-vulnerabilities-that-actually-matter/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Wed, 25 Feb 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[ThreatConnect Platform]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=21058</guid>

					<description><![CDATA[<p>Why Vulnerability Prioritization Breaks Down for MSSPs — and How the Best Are Fixing It When 95% of organizations are falling short of response time best practices, MSSPs who can consistently reduce mean time to respond (MTTR) don’t just improve security outcomes — they win and retain customers. But faster response doesn’t come from more [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/prioritizing-vulnerabilities-that-actually-matter/">Prioritizing Vulnerabilities That Actually Matter</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="font-size: 26px;"><b>Why Vulnerability Prioritization Breaks Down for MSSPs — and How the Best Are Fixing It</b></h1>
<p><span style="font-weight: 400;">When </span><a href="https://www.crowdstrike.com/en-us/blog/better-together-global-attitude-survey-takeaways-2021/"><span style="font-weight: 400;">95% of organizations are falling short of response time best practices</span></a><span style="font-weight: 400;">, MSSPs who can consistently reduce mean time to respond (MTTR) don’t just improve security outcomes — they win and retain customers.</span></p>
<p><span style="font-weight: 400;">But faster response doesn’t come from more alerts, feeds, or dashboards alone. It comes from operationalizing how MSSPs prioritize vulnerabilities that actually matter.</span></p>
<p><span style="font-weight: 400;">The real differentiator for modern MSSPs is not how many vulnerabilities they detect. It’s how effectively they </span><b>surface, prioritize, and justify</b><span style="font-weight: 400;"> the vulnerabilities that pose real risk </span><i><span style="font-weight: 400;">right now</span></i><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">And that’s where many providers struggle. Vulnerability prioritization is uniquely difficult for MSSPs — and most traditional approaches were never designed with service providers in mind.</span></p>
<h3><strong>What Vulnerability Prioritization Actually Means for MSSPs</strong></h3>
<p><span style="font-weight: 400;">For MSSPs, vulnerability prioritization is the process of deciding which vulnerabilities across many client environments should be addressed first to reduce real risk, not just theoretical severity.</span></p>
<p><span style="font-weight: 400;">Unlike internal security teams that prioritize for one environment, MSSPs must prioritize:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Across multiple clients</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">At massive scale</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">With incomplete business context</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Under contractual, SLA, and liability constraints</span></li>
</ul>
<p><span style="font-weight: 400;">And the data reflects the strain:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.vectra.ai/resources/2023-state-of-threat-detection"><span style="font-weight: 400;">62% of SOC alerts are disregarded</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">55% of teams have missed critical alerts due to poor prioritization (Mandiant Global Perspectives on Threat Intelligence)</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.vectra.ai/resources/2023-state-of-threat-detection"><span style="font-weight: 400;">97% of analysts worry about missing a relevant security event because it is buried under a flood of alerts</span></a></li>
</ul>
<p><span style="font-weight: 400;">When prioritization breaks down, the impact is immediate. MTTR increases. Analysts drown in noise. And customers lose confidence that their MSSP understands what truly puts their business at risk.</span></p>
<h3><strong>Why Strong Vulnerability Prioritization Is a Force Multiplier for MSSPs</strong></h3>
<p><span style="font-weight: 400;">When done well, vulnerability prioritization becomes more than a security function — it becomes a business advantage.</span></p>
<p><b>Real Risk Reduction (Not Just Cleaner Dashboards)</b><br />
<span style="font-weight: 400;">Strong prioritization shifts the focus away from raw vulnerability counts and toward attack likelihood and impact. Instead of chasing every high-severity CVE, MSSPs can focus remediation on:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Vulnerabilities that are actively exploited</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Exposed attack paths that increase breach likelihood</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Assets attackers actually care about</span></li>
</ul>
<p><span style="font-weight: 400;">The result? Fewer “we patched everything and still got breached” moments and more meaningful risk reduction.</span></p>
<p><b>Stronger Client Trust and Retention</b><br />
<span style="font-weight: 400;">Clients can quickly recognize the difference between noise and insight. Well-prioritized findings are relevant, actionable, and clearly grounded in the client’s environment. </span></p>
<p><span style="font-weight: 400;">Good prioritization signals maturity. It tells customers, </span><i><span style="font-weight: 400;">“This MSSP understands our risk — not just our tools.”</span></i><span style="font-weight: 400;"> That credibility is hard to win, and easy to lose.</span></p>
<p><b>Defensible, Explainable Remediation Focus</b><br />
<span style="font-weight: 400;">MSSPs are constantly asked to justify why certain vulnerabilities were escalated or deprioritized. Strong prioritization creates: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Audit-friendly decision trails</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Clear narratives for executives and boards</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Confidence that remediation efforts were focused where they mattered most</span></li>
</ul>
<h3><strong>Where Vulnerability Prioritization Most Often Fails for MSSPs</strong></h3>
<p><span style="font-weight: 400;">Vulnerability prioritization is essential to reducing MTTR, yet for MSSPs it frequently collapses in execution. Time and again, two common pitfalls derail prioritization and turn urgency into noise.</span></p>
<p><b>Overreliance on CVSS</b><br />
<span style="font-weight: 400;">CVSS scores are easy to automate, scale and explain, which is why they’re so widely used. But on their own, they ignore:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Exploit availability</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Asset exposure</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Business impact</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Compensating controls</span></li>
</ul>
<p><span style="font-weight: 400;">The result is high-severity noise, misaligned urgency, and growing client fatigue.</span></p>
<p><b>Missing or Broken Context</b><br />
<span style="font-weight: 400;">You can’t prioritize effectively without knowing: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What an asset does</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Who owns it</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Whether it’s internet-facing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How it fits into an attack path</span></li>
</ul>
<p><span style="font-weight: 400;">Many MSSPs inherit bad CMDBs, incomplete inventories, or inconsistent tagging. When context collapses, prioritization collapses with it — no matter how good your tooling looks on paper.</span></p>
<h3><strong>The Core Challenges of Vulnerability Prioritization for MSSPs</strong></h3>
<ul>
<li><b>Alert Overload and Noisy Data</b><br />
MSSPs operate under a constant firehose: thousands of vulnerabilities, duplicate findings from overlapping tools, and CVEs that look critical but pose little real risk. Most prioritization frameworks assume clean, normalized data. MSSPs rarely have that luxury. Analysts spend more time sorting noise than reducing risk.</li>
<li><b>Lack of Business Context at Scale</b><br />
MSSPs often lack visibility into revenue-critical systems, crown-jewel assets, and existing compensating controls. Without this context, prioritization defaults to severity scores, and decision-making becomes defensive rather than risk-based.</li>
<li><b>One-Size-Fits-All Scoring Doesn’t Work</b><br />
MSSP clients can vary dramatically:</p>
<ul>
<li><span style="font-weight: 400;">Regulated vs. unregulated</span></li>
<li><span style="font-weight: 400;">Cloud-native vs. legacy environments </span></li>
<li><span style="font-weight: 400;">Security-mature vs. security-constrained teams</span></li>
</ul>
</li>
</ul>
<p style="padding-left: 40px;">One-size-fits-all scoring might be scalable, but it doesn’t capture the context of your client base. MSSPs are constantly forced to choose between accuracy and efficiency.</p>
<ul>
<li><b>Exploit Intelligence Is Hard to Operationalize</b><br />
Even with good threat intel, exploitability changes rapidly and correlating intel to specific environments is messy. Without environmental context, threat intel becomes just another feed — not a prioritization signal.</li>
<li><b>Client Remediation Capacity Is Limited</b><br />
The uncomfortable truth is that clients can’t fix everything. Patch windows are narrow, ops teams are stretched thin, and downtime is expensive. MSSPs must prioritize not only what is most risky, but what is realistically fixable. Most tools ignore this reality.</li>
<li><b>Proving Value to Clients</b><br />
Clients don’t care that you reduced “critical vulnerabilities by 43%.” They<i><span style="font-weight: 400;"> do</span></i><span style="font-weight: 400;"> care about what would have hurt them, what they avoided, and what actually changed their risk posture. Poor prioritization makes value invisible — even when teams are working hard.</span></li>
</ul>
<h3><b>Rethinking Vulnerability Prioritization: What MSSPs Actually Need</b></h3>
<p><span style="font-weight: 400;">MSSPs don’t need another severity score or raw feed. They need </span><b>correlation, context, and clarity</b><span style="font-weight: 400;">. Effective prioritization must connect:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CVEs → exploitability</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Exploits → threat actor behavior</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Threats → customer exposure</span></li>
</ul>
<p><span style="font-weight: 400;">Only then can MSSPs confidently answer the question customers care about most: </span><i><span style="font-weight: 400;">“What should we fix first — and why?”</span></i></p>
<h3><strong>How ThreatConnect Approaches Vulnerability Prioritization Differently</strong></h3>
<p><span style="font-weight: 400;">ThreatConnect takes a fundamentally different approach to vulnerability prioritization — one purpose-built for MSSPs.</span></p>
<p><b>From Generic Scores to Business-Relevant Insight</b><br />
<span style="font-weight: 400;">ThreatConnect goes beyond CVSS to deliver vulnerability insights tailored to each customer’s environment. Each CVE is correlated with:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Real-world exploitability</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Active threat actor behavior</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Known exposure within the customer’s environment</span></li>
</ul>
<p><b>From Volume to Precision</b><br />
<span style="font-weight: 400;">Instead of overwhelming customers with lists of hundreds of vulnerabilities, MSSPs can deliver prioritized precision: “Here are the 3 you need to patch now — and why”. This shift enables faster MTTR, more confident remediation, and clearer client communication.</span></p>
<p><b>Built for MSSP Scale</b><br />
<span style="font-weight: 400;">ThreatConnect is designed to support:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Repeatable prioritization logic</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Context-aware insights without manual tuning</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Multiple customers environments without sacrificing quality or margin</span></li>
</ul>
<h3><strong>Vulnerability Prioritization Is the Difference Between Noise and Value</strong></h3>
<p><span style="font-weight: 400;">MSSPs don’t win by finding more vulnerabilities. They win by helping customers fix the </span><i><span style="font-weight: 400;">right</span></i><span style="font-weight: 400;"> ones. For MSSPs looking to modernize services, reduce MTTR, and scale without burning out analysts, vulnerability prioritization isn’t optional — it’s foundational.</span></p>
<p><span style="font-weight: 400;">Download </span><a href="https://threatconnect.com/resource/modern-mssp-services-powered-by-threatconnect/"><b>Modern MSSP Services Powered by ThreatConnect</b></a><span style="font-weight: 400;"> to learn how leading MSSPs are evolving beyond detection into true risk reduction.</span></p>
<p>The post <a href="https://threatconnect.com/blog/prioritizing-vulnerabilities-that-actually-matter/">Prioritizing Vulnerabilities That Actually Matter</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Mustang Panda Intelligence Dashboard Immediately Available for ThreatConnect</title>
		<link>https://threatconnect.com/blog/mustang-panda-intelligence-dashboard-immediately-available-for-threatconnect/</link>
		
		<dc:creator><![CDATA[Travis Meyers]]></dc:creator>
		<pubDate>Wed, 28 Jan 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[Dashboards]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20903</guid>

					<description><![CDATA[<p>Mustang Panda—also known in industry and government reporting as BASIN, BRONZE PRESIDENT, CAMARO DRAGON, EARTH PRETA, FIREANT, G0129, HIVE015, HoneyMyte, LUMINOUS MOTH, Polaris, RedDelta, STATELY TAURUS, TA416, TANTALUM, TEMP.HEX, TWILL TYPHOON, or UNC6384—is a highly active, state-sponsored Chinese cyber-espionage group assessed to operate under the People’s Republic of China (PRC). Active for over a decade, [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/mustang-panda-intelligence-dashboard-immediately-available-for-threatconnect/">Mustang Panda Intelligence Dashboard Immediately Available for ThreatConnect</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Mustang Panda</b><span style="font-weight: 400;">—also known in industry and government reporting as BASIN, BRONZE PRESIDENT, CAMARO DRAGON, EARTH PRETA, FIREANT, G0129, HIVE015, HoneyMyte, LUMINOUS MOTH, Polaris, RedDelta, STATELY TAURUS, TA416, TANTALUM, TEMP.HEX, TWILL TYPHOON, or UNC6384—is a highly active, state-sponsored Chinese cyber-espionage group assessed to operate under the People’s Republic of China (PRC). Active for over a decade, the group is distinguished by its high operational tempo and “volume over stealth” approach to espionage.</span></p>
<p><span style="font-weight: 400;">Mustang Panda has consistently targeted entities that intersect with Beijing’s geopolitical priorities, particularly government and diplomatic institutions, maritime logistics organizations, and religious institutions. Their campaigns demonstrate a persistent focus on intelligence collection related to foreign policy, trade routes, and sensitive diplomatic engagements.</span></p>
<p><span style="font-weight: 400;">Multiple cybersecurity vendors and government agencies assess with high confidence that Mustang Panda operates in alignment with PRC strategic objectives, based on victimology patterns, infrastructure choices, and activity timing that aligns with Chinese working hours (UTC+8).</span></p>
<p><span style="font-weight: 400;">The new Mustang Panda Dashboard in ThreatConnect offers security teams centralized visibility into this highly active and adaptable adversary.</span></p>
<h4><b>Key Benefits:</b></h4>
<ul>
<li><b>Centralized Intelligence:</b><span style="font-weight: 400;"> Aggregates Mustang Panda-related IOCs, TTPs, malware families, and campaign telemetry from open sources, commercial feeds, and internal data.</span></li>
<li><b>Continuous Threat Tracking: </b><span style="font-weight: 400;">Monitors real-time updates on actor infrastructure, targeting patterns, and evolving tradecraft.</span></li>
<li><b>Accelerated Incident Response:</b><span style="font-weight: 400;"> Provides enriched, contextual intelligence to reduce detection-to-response timelines.</span></li>
<li><b>Visual Reporting &amp; Executive Insights: </b><span style="font-weight: 400;">Interactive charts, timelines, and executive-ready dashboards support risk prioritization and communication.</span></li>
<li><b>Automated Correlation: </b><span style="font-weight: 400;">Leverages ThreatConnect’s automation engine to map Mustang Panda indicators across intrusion sets, malware families, and victim profiles.</span></li>
</ul>
<p><span style="font-weight: 400;">Mustang Panda’s consistent targeting of government, diplomatic, and maritime entities underscores the ongoing risk to sensitive political and economic interests worldwide. </span></p>
<p><span style="font-weight: 400;">The Mustang Panda Dashboard equips defenders with the ability to visualize campaigns, correlate activity, and act decisively—directly within the </span> <a href="https://threatconnect.com/threat-intelligence-platform/">ThreatConnect platform</a>.</p>
<p><b>Note: To maximize the value of this dashboard, organizations may benefit from integration with premium threat intelligence sources such as Dataminr, Mandiant, Recorded Future, or CrowdStrike.<br />
</b></p>
<div id="attachment_20904" style="width: 1034px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-20904" class="wp-image-20904 size-large" src="https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-1024x475.png" alt="" width="1024" height="475" srcset="https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-1024x475.png 1024w, https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-300x139.png 300w, https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-768x356.png 768w, https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda-1536x712.png 1536w, https://threatconnect.com/wp-content/uploads/2025/09/mustang-panda.png 1600w" sizes="(max-width: 1024px) 100vw, 1024px" /><p id="caption-attachment-20904" class="wp-caption-text">Lead Contributor &#8211; Travis Meyers, Customer Success Manager</p></div>
<p><em><b>To gain access to the Mustang Panda Dashboard, please connect with your Customer Success team or reach out to us through our <a href="https://threatconnect.com/contact/" target="_blank" rel="noopener">contact form</a>.</b></em></p>
<h3><strong>Further Resources</strong></h3>
<p><span style="font-weight: 400;">For more detailed information and resources on Salt Typhoon, please refer to the following:</span></p>
<table style="border-style: solid;" border="1">
<tbody>
<tr>
<td style="border-style: solid; text-align: center;"><strong>Resource</strong></td>
<td style="text-align: center;"><strong>Description</strong></td>
<td style="text-align: center;"><strong>Link</strong></td>
</tr>
<tr>
<td style="text-align: center;"><span style="font-weight: 400;">MITRE</span></td>
<td><span style="font-weight: 400;">As a not-for-profit organization, MITRE acts in the public interest by delivering objective, cost-effective solutions to many of the world&#8217;s biggest challenges.</span></td>
<td style="text-align: center;"><strong><a href="https://attack.mitre.org/groups/G0129" target="_blank" rel="noopener">MITRE Article</a></strong></td>
</tr>
<tr>
<td style="text-align: center;"><span style="font-weight: 400;">The Hacker News</span></td>
<td><span style="font-weight: 400;">THN Media Private Limited, the parent organization behind The Hacker News (THN), stands as a top and reliable source for the latest updates in cybersecurity. As an independent outlet, we offer balanced and thorough insights into the cybersecurity sector, trusted by professionals and enthusiasts alike.</span></td>
<td style="text-align: center;"><strong><a href="https://thehackernews.com/2025/12/mustang-panda-uses-signed-kernel-driver.html" target="_blank" rel="noopener">THN Article</a></strong></td>
</tr>
<tr>
<td style="text-align: center;"><span style="font-weight: 400;">Reuters</span></td>
<td><span style="font-weight: 400;">Reuters is the leading global source of news coverage. We have been licensing content and information to media organizations, technology companies, governments and corporations since 1851.</span></td>
<td style="text-align: center;"><strong><a href="https://www.reuters.com/business/media-telecom/chinese-linked-hackers-target-us-entities-with-venezuelan-themed-malware-2026-01-15" target="_blank" rel="noopener">Reuters Article</a></strong></td>
</tr>
</tbody>
</table>
<p><span style="font-weight: 400;">We urge all organizations to remain vigilant and proactive in their cybersecurity efforts. By implementing these recommendations, you can significantly reduce your risk and protect your critical assets.<br />
</span></p>
<h3><b>Mustang Panda Known Exploited Vulnerabilities</b></h3>
<table style="width: 100%; border-collapse: collapse; border-style: solid; height: 1340px;">
<tbody>
<tr style="height: 24px; border-style: solid;">
<td style="width: 33.3333%; height: 24px; border-style: solid; text-align: center;"><strong>CVE ID</strong></td>
<td style="width: 33.3333%; text-align: center; height: 24px;"><strong>Product</strong></td>
<td style="width: 33.3333%; text-align: center; height: 24px;"><strong>Description</strong></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><b>CVE-2025-55182</b></td>
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><span style="font-weight: 400;">IoT / Web Apps</span></td>
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><b>React2Shell:</b><span style="font-weight: 400;"> Critical flaw exploited by the </span><b>RondoDox</b><span style="font-weight: 400;"> botnet (associated with Mustang Panda) to compromise IoT devices.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><b>CVE-2025-14847</b></td>
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><span style="font-weight: 400;">MongoDB</span></td>
<td style="width: 33.3333%; text-align: center; height: 96px; border-style: solid;"><b>MongoBleed:</b><span style="font-weight: 400;"> Active exploitation allowing unauthenticated attackers to coerce servers into leaking sensitive memory data.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><b>CVE-2025-9491</b></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><span style="font-weight: 400;">Windows UI</span></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><b>LNK Bypass:</b><span style="font-weight: 400;"> Confirmed extensive exploitation by Mustang Panda to deliver </span><b>PlugX</b><span style="font-weight: 400;"> via malicious shortcut files</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><b>CVE-2025-41244</b></td>
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><span style="font-weight: 400;">VMware Tools</span></td>
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><span style="font-weight: 400;">Exploited alongside Windows flaws for privilege escalation and persistence.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><b>CVE-2024-21893</b></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><span style="font-weight: 400;">Ivanti Connect Secure</span></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><span style="font-weight: 400;">Authentication bypass used to deploy </span><b>MetaRAT</b><span style="font-weight: 400;"> (PlugX variant) targeting shipping companies in Japan.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 104px; border-style: solid;"><b>CVE-2024-0012</b></td>
<td style="width: 33.3333%; text-align: center; height: 104px; border-style: solid;"><span style="font-weight: 400;">Palo Alto PAN-OS</span></td>
<td style="width: 33.3333%; text-align: center; height: 104px; border-style: solid;"><span style="font-weight: 400;">Exploited for authentication bypass, often leading to ransomware-like behavior or espionage.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><b>CVE-2025-10585</b></td>
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><span style="font-weight: 400;">Google Chrome</span></td>
<td style="width: 33.3333%; text-align: center; height: 56px; border-style: solid;"><span style="font-weight: 400;">Zero-day in the V8 engine, patched but actively exploited.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><b>CVE-2023-4966</b></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><span style="font-weight: 400;">Citrix NetScaler</span></td>
<td style="width: 33.3333%; text-align: center; height: 72px; border-style: solid;"><b>Citrix Bleed:</b><span style="font-weight: 400;"> Session hijacking vulnerability used to bypass authentication.</span></td>
</tr>
<tr style="border-style: solid;">
<td style="width: 33.3333%; text-align: center; height: 72px;"><b>CVE-2025-6202</b></td>
<td style="width: 33.3333%; border-style: solid; text-align: center; height: 72px;"><span style="font-weight: 400;">DRAM (Hardware)</span></td>
<td style="width: 33.3333%; text-align: center; height: 72px;"><b>Rowhammer Variant:</b><span style="font-weight: 400;"> Advanced hardware-level attack bypassing DDR5 protections.</span></td>
</tr>
</tbody>
</table>
<p>The post <a href="https://threatconnect.com/blog/mustang-panda-intelligence-dashboard-immediately-available-for-threatconnect/">Mustang Panda Intelligence Dashboard Immediately Available for ThreatConnect</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why ThreatConnect’s VP of Product Marketing Spends His Off Hours Rescuing Wild Foxes</title>
		<link>https://threatconnect.com/blog/why-threatconnects-vp-of-product-marketing-spends-his-off-hours-rescuing-wild-foxes/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Tue, 27 Jan 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Talent]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20892</guid>

					<description><![CDATA[<p>The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know! As a seasoned marketer in the cybersecurity space, Dan Cole has heard all of the [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/why-threatconnects-vp-of-product-marketing-spends-his-off-hours-rescuing-wild-foxes/">Why ThreatConnect’s VP of Product Marketing Spends His Off Hours Rescuing Wild Foxes</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i><span style="font-weight: 400;">The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know!</span></i></p>
<p><span style="font-weight: 400;">As a seasoned marketer in the cybersecurity space, Dan Cole has heard all of the old product narratives before — from “attackers are outpacing security teams faster than ever” to “alert fatigue is overwhelming analysts.” In an industry where the work is both complex and, to some, a little dry, it can be tricky to come up with new, flashy ways to tell a brand story. That’s why Cole always starts with what matters most: helping analysts do work with real impact.</span></p>
<p><span style="font-weight: 400;">“We’re really trying to help these analysts prioritize work that actually helps them feel like they are making a difference,” Cole says. Sometimes that means explaining ways to use tools like ThreatConnect’s Risk Quantifier to attach real dollar figures to the results threat intelligence provides. And other times, it means finding new ways to share best practices — like, say, by comparing them to </span><i><span style="font-weight: 400;">Star Wars. </span></i></p>
<p><span style="font-weight: 400;">Whatever he might be working on, Cole wants to make sure ThreatConnect’s products solve the biggest real-world problems facing clients. And as for when he’s outside of work? You’ll probably find him outside photographing and, sometimes, rescuing wild foxes.</span></p>
<p style="text-align: center;"><em>The following conversation has been edited for clarity and length. </em></p>
<p><b>How did you get into threat intelligence, and what does your role look like day to day?</b></p>
<p><b>Dan Cole: </b><span style="font-weight: 400;">I was a product manager for almost 15 years in a variety of industries, but then I was hired at ThreatConnect 10 years ago as part of their series B to lead and build out their product management team. I&#8217;ve kind of shifted roles since then, but it involves spending a lot of time with customers to understand their pain points, understand where they&#8217;re running into roadblocks, and make sure that our roadmap is prioritized to remove those roadblocks. Since then my role has shifted to help educate the market on some of the best ways to remove those roadblocks &#8211; ideally with our products!</span><b></b></p>
<p><span style="font-weight: 400;">Pretty much everything I learned about threat intelligence, I learned from our customers and the challenges that they are actively facing every single day.</span></p>
<p><b>What is the most challenging part of your job?</b></p>
<p><span style="font-weight: 400;">The most challenging part of my job is ensuring that what we are doing helps people feel like they matter. We all want to feel like the work we&#8217;re doing is making some kind of impact and moving some kind of needle. Like it&#8217;s not just busy work that&#8217;s going to end up in the trash. </span></p>
<p><span style="font-weight: 400;">Every vendor talks about alert fatigue and how overwhelming it can be. Studies clearly show the impact that those sorts of things have on the emotional well being of these analysts. But our goal isn’t just to help analysts feel less overwhelmed. We’re really trying to help these analysts prioritize work that actually helps them feel like they are making a difference.</span></p>
<p><b>I saw you’ve </b><a href="https://threatconnect.com/resource/how-the-rebels-beat-the-empire-cyber-threat-intelligence-lessons-from-star-wars/"><b>used </b><b><i>Star Wars </i></b><b>as an analogy</b></a><b> for the threat gap in a webinar before. What gave you the idea to do that?</b></p>
<p><span style="font-weight: 400;">We want to stand out in the industry and make things a little fun. Considering the toll that this work takes on the mental health of these analysts, if we can give them a break with something a little entertaining, great. It’s better than another dry corporate webinar where someone is just pitching their product. It’s about evangelizing not just our products, but the different approaches to cyber defense that can make analysts more effective in their roles. </span></p>
<p><b>You’ve also </b><a href="https://www.cyberdefensemagazine.com/wielding-ai-as-a-teammate-in-cybersecurity/"><b>written</b></a><b> about how cybersecurity professionals can use AI as a teammate. How would you describe the potential and the risks associated with AI? </b></p>
<p><span style="font-weight: 400;">The way one customer put it to me was that AI is kind of the world&#8217;s smartest intern. I might trust an intern to do research, but I&#8217;m not going to let them push the big red button or handle something that might blow up our security stack. </span></p>
<p><span style="font-weight: 400;">One big risk is that AI can be a black box; you might not be able to really understand how it reached its conclusion. It&#8217;s very easy to add an LLM to an existing security product, but it can be hard to know if the underlying data that that LLM uses is any good. But at ThreatConnect, we have the DNA of being a data company. We have billions of records and 1.2 million different sources of data. So the LLMs that we put on top of our products have access to data that is vetted and high fidelity and reliable, and we can be transparent and provide receipts. So when you hire that “intern,” you can trust the data that they are running out to gather is solid.</span></p>
<p><b>That would make a huge difference. And how do you spend your time outside of ThreatConnect?</b></p>
<p><span style="font-weight: 400;">I am an amateur wildlife photographer. I also do wildlife rescue, including volunteering at a rescue focused on saving foxes from fur farms. I enjoy all things food — from gardening, to actually growing the food, to cooking, to actually making the food, to going out to restaurants to enjoy food without having to do dishes. I also love backpacking and being outdoors.</span></p>
<p><b>Which rescue organization do you work with, and what’s that like as a hobby? </b></p>
<p><span style="font-weight: 400;">It&#8217;s called the Wildlife Rescue League. I also work with Save a Fox out of Minnesota. And it&#8217;s not easy. When wild animals are injured or sick, they don&#8217;t want to be trapped. But we have an entire network of rescuers, transporters, vets, and rehabilitators. </span></p>
<p><span style="font-weight: 400;">Just this past Sunday, I picked up a raccoon that had pneumonia, put him in the back of my car, and drove him to a rehabilitator where he&#8217;s going to get some antibiotics, get some rest, and eventually be released back into the wild.</span></p>
<p><b>What other types of animals have you rescued?</b></p>
<p><span style="font-weight: 400;">Foxes are my favorite, but I’ve also gotten to release a one-eyed owl back into the wild. I’ve done turkey vultures, which are super cool. And one time, I had a red shouldered hawk, which spent the entire car ride screaming at the top of its lungs. It was still super fun.</span></p>
<p><b>Do you have some sort of enclosure in your backseat to transport these animals?</b></p>
<p><span style="font-weight: 400;">Sometimes it&#8217;s just a cardboard box, and sometimes a cage. Luckily, I’ve never had an escapee, but it has happened to others.</span></p>
<p><b>I’d wondered about that. Why are foxes your favorite?</b></p>
<p><span style="font-weight: 400;">Gosh, I&#8217;m trying to think of a way to loop them back to the theme of threat intelligence. </span></p>
<p><b>If you could do that, it would be great for this article!</b></p>
<p><span style="font-weight: 400;">I&#8217;ll start a sentence, and eventually I&#8217;ll find my way there. First of all, they&#8217;re beautiful. They are misunderstood. And just like I like to stand up for the intelligence analysts, I&#8217;m a fan of the underdog. I want to stand up for the little guy. But foxes are extremely clever. They’re this perfect mix of curiosity and bravery and caution, and they’re very adaptable.</span></p>
<p><span style="font-weight: 400;">When I think about threat intelligence and cybersecurity, I do think good analysts also have a healthy mix of curiosity, bravery and caution. You want to be bold, because the attackers certainly are, but you also want to be cautious and not make mistakes when you&#8217;re taking a blocking action or promoting a new strategy. And certainly, you have to be extremely clever and extremely adaptable. For example, as adversaries start leveraging AI more and more, we need to adapt the way we do cyber defense so that we can stay ahead of those threats.</span></p>
<p><b>Nicely done with that metaphor. And has wildlife rescue also made you better at wildlife photography?</b></p>
<p><span style="font-weight: 400;">Yeah, 100%. Foxes, especially, have such varied personalities. You can just tell they let the intrusive thoughts win. Now that I’ve gotten to know their personalities, it’s helped me not only work with them but also figure out what I want to bring out in my photos. If I&#8217;ve got a fox that is particularly spicy, I want to find an opportunity to showcase that.</span></p>
<p>The post <a href="https://threatconnect.com/blog/why-threatconnects-vp-of-product-marketing-spends-his-off-hours-rescuing-wild-foxes/">Why ThreatConnect’s VP of Product Marketing Spends His Off Hours Rescuing Wild Foxes</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>ThreatConnect Customer Success Engineer Angel Salcedo Makes Success a Team Sport</title>
		<link>https://threatconnect.com/blog/threatconnect-customer-success-engineer-angel-salcedo-makes-success-a-team-sport/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 14:00:24 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Talent]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20667</guid>

					<description><![CDATA[<p>The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know! Angel Salcedo radiates energy even through a computer screen. The warmth in his smile and [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/threatconnect-customer-success-engineer-angel-salcedo-makes-success-a-team-sport/">ThreatConnect Customer Success Engineer Angel Salcedo Makes Success a Team Sport</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i><span style="font-weight: 400;">The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know!</span></i></p>
<p><span style="font-weight: 400;">Angel Salcedo radiates energy even through a computer screen. The warmth in his smile and the confidence in his voice help explain why he thrives as a customer success engineer: he  knows that the work begins with careful, empathetic communication. </span></p>
<p><span style="font-weight: 400;">“Customer success is not about knowing all the answers,” Salcedo says. “It’s about starting a dialogue where everyone’s expertise carries equal weight. That’s how you problem-solve in a field that’s always changing.”</span></p>
<p><span style="font-weight: 400;">“In tech, what was yesterday is not today, and what&#8217;s today is not tomorrow,” Salcedo says. “The more we allow that opportunity to be collaborative rather than feeling we have to know it all, the more we can deliver.” Read on to learn how he helps ThreatConnect clients reach their goals.</span></p>
<p style="text-align: center;"><em>The following conversation has been edited for clarity and length. </em></p>
<p><b>How did you get into threat intelligence?</b></p>
<p><b>Angel Salcedo: </b><span style="font-weight: 400;">It’s a funny story. I graduated with my master&#8217;s in information technology from Kennesaw State University in 2019. I held a few jobs after graduation before I found myself in a Tier 2 developer role during the pandemic. My interest in technology and systems continued to grow. I found myself constantly asking questions, questioning solutions, and ultimately became curious about other roles in information technology.</span><b></b></p>
<p><span style="font-weight: 400;">I stayed at that company until 2022, when I landed a role as a cybersecurity analyst. I then had the opportunity to coordinate with a recruiter at ThreatConnect. The recruiter I met with was not only welcoming but also made me feel like ThreatConnect could be my place to grow tremendously. My first round interview felt fate-fueled. It was an interview where the interviewer and interviewee just clicked. I answered the questions confidently while expressing my curiosity and desire to grow. It was welcomed, and I was told I would grow tremendously. That is still true to this day. </span></p>
<p><b>What does your role look like day to day?</b></p>
<p><span style="font-weight: 400;">Threat intel is, in and of itself, a beast with many facets and complexities that can be challenging for our clients to understand when they first work within ThreatConnect. I work as a conduit to successfully deploy automations, develop workflows, and create visualizations that help leadership understand the actions to take to improve their businesses&#8217; security posture. I tackle meetings, work with different organizations and people, and constantly ask, “What are ways we can further mature your cybersecurity program? What&#8217;s our next big mountain to climb?”</span></p>
<p><b>What is either the most challenging or maybe interesting part of your job?</b></p>
<p><span style="font-weight: 400;">I like to say I’m a jack-of-all-trades because of the vast number of tools ThreatConnect integrates with. My engineering colleagues and I are like puzzle pieces that come together to form a really great picture. We all bring different skills and different tools that work together to develop a successful threat intelligence program. Not only do I feel like a whiz at ThreatConnect, but, thanks to what my colleagues with expertise in other areas have taught me, I also feel pretty sharp when it comes to different tools that integrate with ThreatConnect. </span></p>
<p><b>How do you set customers up for success with these tools?</b></p>
<p><span style="font-weight: 400;">It&#8217;s about putting your hand out and saying that we&#8217;re going to do this together. That&#8217;s the beauty of customer success: you&#8217;re not alone, and I&#8217;m not alone. We&#8217;re going to get to the other side together. I love working through that dialogue and letting them know, “Hey, your idea is just as important as my idea, and our ideas together are going to get us where we want to go.” It’s an opportunity for us to learn from each other, and that’s just as important as being the one who knows all the answers, because new things pop up every day. </span></p>
<p><span style="font-weight: 400;">In tech, what was yesterday is not today, and what&#8217;s today is not tomorrow. The more we allow that opportunity to be collaborative rather than feeling we have to know it all, the more we can deliver.</span></p>
<p><b>What’s been the most interesting thing you’ve worked on this past year?</b></p>
<p><span style="font-weight: 400;">In 2024, ThreatConnect acquired Polarity, so one thing I’ve been able to do is connect that tool to ThreatConnect more cohesively. Previously, Polarity interacted with ThreatConnect to gather intel and present it from Polarity’s perspective. This year, I worked with some of the engineers and developers on the Polarity side to get a successful integration with ThreatConnect underway. Since demonstrating the capability, a few organizations I worked with before the acquisition have told me, “This capability is how I envisioned Polarity being integrated into ThreatConnect from the very beginning!” That’s been a challenge that I have learned tremendously from.</span></p>
<p><b>How do you like to spend your time outside of ThreatConnect? </b></p>
<p><span style="font-weight: 400;">I love to spend time with my family and friends. I am a community-oriented person. I enjoy bringing great people together. I am also someone who uses a wheelchair. I call it sitting down, and it&#8217;s driven me a lot, no pun intended. It&#8217;s been really cool to see how that part of my life has provided me with adventurous opportunities. I&#8217;m one of the ambassadors for the Kyle Pease Foundation, a really great national organization based here in Georgia. It allows people with disabilities who sit down, like me, to participate in 5K runs, 10Ks, half marathons, and marathons around the country. I completed a half-marathon in two hours and 10 minutes at about 5 a.m. on Thanksgiving Day. I also volunteer and am a member of Phi Beta Sigma Fraternity, Incorporated, so that&#8217;s a big part of my life, too. </span></p>
<p><img decoding="async" class="aligncenter wp-image-20670 size-medium" src="https://threatconnect.com/wp-content/uploads/2025/12/8F104430-FFBA-46E1-A388-1470BB2D5409_1_105_c-249x300.jpeg" alt="" width="249" height="300" srcset="https://threatconnect.com/wp-content/uploads/2025/12/8F104430-FFBA-46E1-A388-1470BB2D5409_1_105_c-249x300.jpeg 249w, https://threatconnect.com/wp-content/uploads/2025/12/8F104430-FFBA-46E1-A388-1470BB2D5409_1_105_c-768x927.jpeg 768w, https://threatconnect.com/wp-content/uploads/2025/12/8F104430-FFBA-46E1-A388-1470BB2D5409_1_105_c.jpeg 807w" sizes="(max-width: 249px) 100vw, 249px" /></p>
<p><span style="font-weight: 400;">The beautiful thing about what my life has taught me is that I&#8217;m never afraid of a challenge. I love doing hard stuff, and so it&#8217;s brought me to this place of wondering, “What&#8217;s the next hard thing I can do, and what&#8217;s the next hard thing after that?” My circumstances have definitely made me think outside the box, but they&#8217;ve also, in some ways, made me create my own shape, and that&#8217;s been a really, really beautiful thing. I don&#8217;t know if this is a quote from someone else; I hope it&#8217;s just me, but I live by it and think it will guide me for the rest of my life: “See the man before the chair.”</span></p>
<p><b>It takes a lot of work to complete a half-marathon. How do you apply that discipline to your job?</b></p>
<p><span style="font-weight: 400;">I always think that people have a fire inside that burns regardless of their circumstances. I call them “core fires”. If I had everything today and nothing tomorrow, my core fire would still burn. Mine is that I love to help people. I&#8217;ve had a really excellent upbringing from people who wanted to help me and who saw beauty in my spirit and my light. I feel like I&#8217;m here on purpose. I love to give back; in work, that translates to both creating solutions and authentically engaging with our clients. It&#8217;s being able to talk to someone who might need that extra little conversation about how their dog is doing, even if it&#8217;s just that small. </span></p>
<p><span style="font-weight: 400;">I love that about my job; it&#8217;s not just about engineering great things. I love the challenge of that, but more than anything, I really do love to help. This year, two of the organizations I work with reached 100% of their goals, and that really makes me happy. It is our success and hard work that allowed us to achieve 100%. For them to be on the other side and say, “That engineer is doing great things for us.” That is what truly excites me every day at my job.</span></p>
<p>The post <a href="https://threatconnect.com/blog/threatconnect-customer-success-engineer-angel-salcedo-makes-success-a-team-sport/">ThreatConnect Customer Success Engineer Angel Salcedo Makes Success a Team Sport</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Threat-Informed Response Slashes MTTR and Boosts MSSP Margins</title>
		<link>https://threatconnect.com/blog/how-threat-informed-response-slashes-mttr-and-boosts-mssp-margins/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Mon, 29 Dec 2025 14:00:24 +0000</pubDate>
				<category><![CDATA[ThreatConnect Platform]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20655</guid>

					<description><![CDATA[<p>The hard reality for Managed Security Services Providers (MSSPs) is that customers today expect faster answers, higher visibility into threats, and total confidence that their provider can separate signal from noise. Meanwhile, alert volume continues to surge across SIEM, EDR, XDR, and cloud telemetry while SOC teams remain understaffed and overwhelmed.  This perfect storm of [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/how-threat-informed-response-slashes-mttr-and-boosts-mssp-margins/">How Threat-Informed Response Slashes MTTR and Boosts MSSP Margins</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The hard reality for Managed Security Services Providers (MSSPs) is that customers today expect faster answers, higher visibility into threats, and total confidence that their provider can separate signal from noise. Meanwhile, alert volume continues to surge across SIEM, EDR, XDR, and cloud telemetry while SOC teams remain understaffed and overwhelmed. </span></p>
<p><span style="font-weight: 400;">This perfect storm of constraints drives mean time to respond (MTTR) higher, which can erode customer trust, limit scalability, and eat directly into MSSP margins.</span></p>
<h3><strong>The True Cost of High MTTR for MSSPs</strong></h3>
<p><span style="font-weight: 400;">When analysts are drowning in alerts, the business impact is immediate:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Slow triage leads to missed SLA misses and customer dissatisfaction.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">More escalations lead to higher labor hours and reduced margins.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The economic challenge: you can’t scale headcount linearly with customer growth.</span></li>
</ul>
<p><span style="font-weight: 400;">And the data reflects the strain:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.vectra.ai/resources/2023-state-of-threat-detection"><span style="font-weight: 400;">62% of SOC alerts are disregarded</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">55% of teams have missed critical alerts due to poor prioritization (Mandiant Global Perspectives on Threat Intelligence)</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.vectra.ai/resources/2023-state-of-threat-detection"><span style="font-weight: 400;">97% of analysts worry about missing a relevant security event because it is buried under a flood of alerts</span></a></li>
</ul>
<p><span style="font-weight: 400;">This is not just inefficiency — it’s operational and reputational risk.</span></p>
<h3><strong>Why Traditional Triage Fails: The Context Gap</strong></h3>
<p><a href="https://threatconnect.com/solutions/alert-triage/"><span style="font-weight: 400;">Triage is a critical function of MSSPs</span></a><span style="font-weight: 400;">, and is supposed to help analysts quickly evaluate, prioritize, and act on alerts — separating genuine threats from false positives, and determining the appropriate response.</span><b></b></p>
<p><span style="font-weight: 400;">However, if alerts pop up without meaningful intelligence or context, analysts are left with a noisy signal, lacking actor info, TTPs, or historical sightings. Analysts must jump between tools, browsers, APIs, and spreadsheets just to understand what they’re looking at. Tool sprawl forces constant context switching and rework. Even a few extra minutes per alert, multiplied across thousands of alerts, creates massive operational drag.</span><b></b></p>
<p><span style="font-weight: 400;">This leads to:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Disorganized enrichment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Inconsistent outcomes</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Burnout</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">False positives piling up</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Customers questioning the value of the service</span></li>
</ul>
<p><span style="font-weight: 400;">The root problem: </span><b>alerts don’t come with enough intelligence to support fast, defensible decisions.</b></p>
<h3><strong>The Missing Link: Threat-Informed Response</strong></h3>
<p><span style="font-weight: 400;">Threat-informed response embeds intelligence directly into the alert workflow, so analysts don’t have to hunt for answers</span><i><span style="font-weight: 400;">. </span></i><span style="font-weight: 400;">No guesswork. No tab sprawl. No manual lookup. The right intel appears exactly when and where analysts need it.</span></p>
<p><span style="font-weight: 400;">With threat-informed response, MSSPs can:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Accelerates triage decisions</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Improves accuracy</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reduces escalations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Standardizes how analysts evaluate alerts</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Instantly raises the performance of junior analysts</span></li>
</ul>
<p><span style="font-weight: 400;">Threat-informed response turns raw alerts into actionable intelligence.</span></p>
<h3><strong>How ThreatConnect Operationalizes Threat-Informed Response</strong></h3>
<p><span style="font-weight: 400;">ThreatConnect delivers real-time enrichment directly into the tools analysts already use. As soon as an alert fires, analysts can instantly see:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Associated threat actors</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Relevant TTPs</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Whether it’s been seen in the customer environment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Whether it’s been observed across ThreatConnect’s intelligence community</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Related indicators, attributes, and confidence scores</span></li>
</ul>
<p><span style="font-weight: 400;">All without leaving their SIEM, EDR, ticketing system, or email. Unlike traditional TI portals — which require slow, repetitive manual lookup — ThreatConnect brings intelligence to the alert.</span></p>
<p><span style="font-weight: 400;">The result is consistent, defensible triage every time. Analysts not only see that something is risky — they understand </span><i><span style="font-weight: 400;">why</span></i><span style="font-weight: 400;">.</span></p>
<h3><strong>How Threat-Informed Response Becomes a Profit Multiplier for MSSPs</strong></h3>
<p><b>Before Threat-Informed Response</b><br />
<span style="font-weight: 400;">Alerts wait in the queue for enrichment. Senior analysts are pulled into escalations. MTTR inflates and false positives waste cycles. SLA misses increase eroding customer trust.</span></p>
<p><b>After Threat-Informed Response with ThreatConnect</b><br />
<span style="font-weight: 400;">Analysts make first-touch triage decisions in seconds, not minutes. Fewer alerts escalate to costly Tier 2 and Tier 3. MTTR drops across the board and false positives get closed rapidly. True threats get flagged faster giving customers clearer, more trustworthy answers.</span></p>
<h3><strong>The Impact On Your Bottom Line</strong></h3>
<p><span style="font-weight: 400;">Faster triage not only protects MSSP margins  — it improves them. </span></p>
<p><span style="font-weight: 400;">Lower unplanned labor hours, less analyst burnout and turnover, and improved SLA performance reduce churn and allow MSSPs to scale customers without linear headcount growth.</span></p>
<ul>
<li><b>Reduces the cost to respond to every alert. </b><span style="font-weight: 400;">Real-time context eliminates unnecessary analysis cycles, so analysts focus on threats that </span><i><span style="font-weight: 400;">actually matter</span></i><span style="font-weight: 400;">.</span></li>
<li><b>Improves SLA performance and compliance. </b><span style="font-weight: 400;">Lower MTTR boosts SLA reliability. Reporting becomes more robust and defensible.</span></li>
<li><b>Delivers clear, contextual answers that customers understand.</b><span style="font-weight: 400;"> Analysts can explain “what’s happening” without diving into technical jargon. Customers feel protected, and they see clear value.</span></li>
<li><b>Improves retention and opens doors to higher-margin services. </b><span style="font-weight: 400;">Threat-informed response becomes a differentiator. Enables upsell opportunities (threat hunting, premium tiers, custom intel feeds). Customers stay longer and spend more.</span></li>
</ul>
<p><span style="font-weight: 400;">Threat-informed response becomes both an operational advantage and a revenue driver.</span></p>
<h3><strong>The Future of MSSP Operations: Threat-Informed Response as a Competitive Advantage</strong></h3>
<p><span style="font-weight: 400;">Threat intel is no longer optional — it’s an operational requirement. Customers are increasingly choosing MSSPs based on their ability to respond quickly and confidently.</span></p>
<p><span style="font-weight: 400;">MSSPs who adopt threat-informed response gain a defensible, performance-based edge. Those who don’t will struggle to keep pace as threats grow in sophistication.</span></p>
<h3><strong>Why ThreatConnect Is Positioned as the Future Standard</strong></h3>
<p><span style="font-weight: 400;">ThreatConnect is purpose-built for MSSPs, offering:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Embedded intelligence where analysts work</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Unified view across tools</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Adaptive, continuously evolving intelligence engine</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Designed for repeatable, scalable service delivery </span></li>
</ul>
<p><span style="font-weight: 400;">ThreatConnect turns intelligence into action — instantly.</span></p>
<h3><strong>Slash MTTR and Boost MSSP Margins with ThreatConnect</strong></h3>
<p><span style="font-weight: 400;">MSSPs won’t win by throwing more bodies at the alert problem. They’ll win by empowering analysts with better context.</span></p>
<p><span style="font-weight: 400;">Threat-informed responses transform alert overload into a high-confidence, scalable workflow. ThreatConnect is the engine that makes it possible. </span></p>
<p><span style="font-weight: 400;">With ThreatConnect, MSSPs can:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Slash MTTR</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reduce operational costs</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Strengthen customer trust</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Drive higher margins</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">And scale without burnout</span></li>
</ul>
<p><a href="https://threatconnect.com/resource/modern-mssp-services-powered-by-threatconnect/"><span style="font-weight: 400;">Learn more</span></a><span style="font-weight: 400;"> about how ThreatConnect’s threat-informed response can slash MTTR and improve margins for MSSPs. </span></p>
<p>The post <a href="https://threatconnect.com/blog/how-threat-informed-response-slashes-mttr-and-boosts-mssp-margins/">How Threat-Informed Response Slashes MTTR and Boosts MSSP Margins</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How ThreatConnect Senior Security Engineer Matt Brash Rescues SOC Teams from Burnout</title>
		<link>https://threatconnect.com/blog/how-threatconnect-senior-security-engineer-matt-brash-rescues-soc-teams-from-burnout/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Wed, 24 Dec 2025 14:00:24 +0000</pubDate>
				<category><![CDATA[Advanced Persistent Talent]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20630</guid>

					<description><![CDATA[<p>The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know! How does a biochemistry diplomate wind up working in cybersecurity? For ThreatConnect Senior Security Engineer [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/how-threatconnect-senior-security-engineer-matt-brash-rescues-soc-teams-from-burnout/">How ThreatConnect Senior Security Engineer Matt Brash Rescues SOC Teams from Burnout</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i><span style="font-weight: 400;">The Advanced Persistent Talent series profiles ThreatConnect employees and explores how their work impacts products and offerings, how they got here, and their views on the industry at large. Want to know more about a particular team? Let us know!</span></i></p>
<p><span style="font-weight: 400;">How does a biochemistry diplomate wind up working in cybersecurity? For ThreatConnect Senior Security Engineer Matt Brash, it was all about being in the right place, and talking to the right person, at the right time. </span></p>
<p><span style="font-weight: 400;">Brash had been working part-time in a suit shop after graduating from university as he planned his next moves when he met a customer who worked in cybersecurity. While he sold the man on the suit, the client sold him on the field. “It was really that one conversation in a suit shop that sort of shaped my career,” he says. It’s turned out to be a perfect fit. </span></p>
<p><span style="font-weight: 400;">Analytical by nature, Brash relishes the problem-solving that goes into his work as a security engineer, taking complex problems and transforming them into an actionable game plan. “The intelligence problems that our customers have can often feel overwhelming to them,” Brash says, “and sometimes they need guidance in taking that big problem and breaking it down into small, tangible improvements that we can add over time.” </span></p>
<p><span style="font-weight: 400;">That, for Brash, is the most rewarding part of the job — “when you can step back and actually see that a team is working more efficiently and leveraging the data we provide in a meaningful way.” Here’s how he gets it done.</span></p>
<p style="text-align: center;"><em>The following conversation has been edited for clarity and length. </em></p>
<p><b>What does your job at ThreatConnect entail on a day-to-day basis?</b></p>
<p><b>Matt Brash: </b><span style="font-weight: 400;">My job is to help understand customers’ technical needs when it comes to using threat intelligence data, and to then turn those needs into real-world capabilities in our platform. </span><b></b></p>
<p><span style="font-weight: 400;">ThreatConnect is an automation platform that centralizes lots of different intelligence data into one place, so I help customers understand what types of intelligence they can access and what formats that data is available in. Then, the question becomes, “What do we do with the data?” And that&#8217;s about understanding who is going to be able to make decisions based upon that intelligence, so we dig into specific pain points within the rest of the security team to understand how they can use curated intelligence to work more efficiently.</span></p>
<p><b>Which side of that equation would you say is more challenging? </b></p>
<p><span style="font-weight: 400;">Definitely the latter. I think threat intelligence teams sometimes struggle to justify their value. They provide huge value to security organizations, but it&#8217;s not always easily quantifiable. We help customers capture key metrics to demonstrate the performance improvement that intelligence provides.</span></p>
<p><span style="font-weight: 400;">I also find that intelligence teams are often positioned as sort of a side team for the rest of the security, whereas at ThreatConnect, we&#8217;re trying to empower them to feel that actually, no, intelligence is really the heart and knowledge base that should inform all of the security teams. That&#8217;s the mentality change we&#8217;re trying to drive.</span></p>
<p><b>What excites you most about this work?</b></p>
<p><span style="font-weight: 400;">It sounds really cliche, but it’s probably solving complex problems — being able to tangibly see that we&#8217;ve improved a customer’s business processes through automation, or by making data more accessible to the right security stakeholders. That&#8217;s really the most enjoyable part of the job, when you can step back and actually see that a team is working more efficiently and leveraging the data we provide in a meaningful way.</span></p>
<p><b>What’s the most interesting challenge you’ve worked on this year?</b></p>
<p><span style="font-weight: 400;">The one that stood out for me was helping an organization really operationalize their data. We work with lots of clients from different industries, and a lot of the time, it&#8217;s not a data problem. They already have access to lots of threat intelligence data, but they don&#8217;t, perhaps, know how to prioritize what is relevant to them and then automate feeding this data into their existing processes. </span></p>
<p><span style="font-weight: 400;">That&#8217;s really the type of problem I like to solve, because cyber as an industry has a big burnout problem. Most security teams we speak to say, “We have too many alerts. We&#8217;re always working outside of our normal working hours.” If we can help those analysts work more efficiently, they&#8217;re going to get greater job satisfaction.</span></p>
<p><b>How has cybersecurity changed in the time you’ve worked in this space?</b></p>
<p><span style="font-weight: 400;">AI has completely flipped the narrative for most organizations in the last 18 months. For example, it’s being used to produce deepfakes, so organizations can no longer trust who they are potentially communicating with. Malware engineers are also using AI to constantly produce new strains of malware. Just like adversaries use AI to target us, we need to know how to use AI to better detect these things. </span></p>
<p><span style="font-weight: 400;">At the same time, every organization in the world is adopting AI in their main technologies. Whether you work in marketing, sales, or HR, you&#8217;re probably using a product today that has some underlying generative or agentic AI capabilities. So the question is, how are we going to make sure that the models that underline those systems can&#8217;t be tampered with by adversaries? All of this, I think, is the new frontier of cyber war. </span></p>
<p><b>How do you like to spend your time outside of work?</b></p>
<p><span style="font-weight: 400;">I made a big lifestyle move a few years ago. I’ve been a West Londoner most of my life; I was born in West London and always sort of stayed around the area, but my wife and I moved to a farm in the west of Ireland three years ago.  I really like the outdoors. I love treks. I love cold water swims and go swimming all year round — December, January, February. I love just being out in the water. </span></p>
<p><span style="font-weight: 400;">Golf is my other passion. I&#8217;m very bad at it; I don&#8217;t have a good handicap, but still, I think golf is a good way of mentally unwinding, especially when you&#8217;re in a high-stress job like we are. You&#8217;re always on when you work in a sales engineering role, always thinking about, “How can I improve this for a customer?” When I’m golfing, I can just completely switch off.</span></p>
<p><b>Cold water swimming sounds like a mental challenge as well as a physical one. What makes it rewarding for you?</b></p>
<p><span style="font-weight: 400;">My sales guys and I have a sort of inside joke about winners’ mentality: you’ve got to push through pain to get what you want in life. Maybe it’s got a little bit to do with that. If you can master your reaction to cold water, you come out, and you feel very relaxed. It&#8217;s almost like you pushed yourself through an endurance test, and whenever you actually go through that barrier, you feel like you&#8217;ve achieved something. </span><span style="font-weight: 400;"></span></p>
<p>The post <a href="https://threatconnect.com/blog/how-threatconnect-senior-security-engineer-matt-brash-rescues-soc-teams-from-burnout/">How ThreatConnect Senior Security Engineer Matt Brash Rescues SOC Teams from Burnout</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Empower Seamless Collaboration with Polarity’s RFI Integration</title>
		<link>https://threatconnect.com/blog/empower-seamless-collaboration-with-polaritys-rfi-integration/</link>
		
		<dc:creator><![CDATA[ThreatConnect]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 14:00:24 +0000</pubDate>
				<category><![CDATA[Polarity]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20610</guid>

					<description><![CDATA[<p>A smarter, faster way for security teams to share context, reduce friction, and accelerate action. Security teams are drowning in alerts, overwhelmed by disconnected tools, and constantly scrambling to get the right information to the right people. Incident response, threat intel, vulnerability management, procurement, and HR all work in different tools — often with zero [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/empower-seamless-collaboration-with-polaritys-rfi-integration/">Empower Seamless Collaboration with Polarity’s RFI Integration</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="font-size: 24px;"><b>A smarter, faster way for security teams to share context, reduce friction, and accelerate action.</b></h2>
<p><span style="font-weight: 400;">Security teams are drowning in alerts, overwhelmed by disconnected tools, and constantly scrambling to get the right information to the right people. Incident response, threat intel, vulnerability management, procurement, and HR all work in different tools — often with zero shared context — creating blind spots and friction that directly impact risk.</span></p>
<p><span style="font-weight: 400;">RFIs (Requests for Information) are supposed to bridge those gaps, but traditional methods through email threads, DMs, tickets, and manual hand-offs lead to more task switching, duplicate work, and delayed decisions.</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">84% of analysts worry about missing threats in oceans of data, according to Crowdstrike Global Security Attitude Survey. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">70% say alert volume hurts their personal well-being, according to CISO Magazine. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">55% of teams miss critical alerts due to ineffective prioritization, according to Mandiant Global Perspectives on Threat Intelligence. </span></li>
</ul>
<p><span style="font-weight: 400;">There has never been a greater need for security collaboration that’s fast, contextual, and frictionless.</span></p>
<p><a href="https://threatconnect.com/polarity-by-threatconnect/"><span style="font-weight: 400;">Polarity by ThreatConnect</span></a><span style="font-weight: 400;"> delivers a unified search, enrichment, and collaboration layer that sits </span><i><span style="font-weight: 400;">on top</span></i><span style="font-weight: 400;"> of your entire security stack. Now, with RFI integration, collaboration happens </span><i><span style="font-weight: 400;">instantly</span></i><span style="font-weight: 400;">, in-context, and without friction.</span></p>
<h3>Breaking Down Knowledge Silos</h3>
<p><span style="font-weight: 400;">Polarity overlays real-time context, threat intel, and AI summaries into any tool — no integrations required. Instead of hunting through different consoles, portals, and documents, Polarity delivers a unified search and enrichment layer that sits </span><i><span style="font-weight: 400;">on top</span></i><span style="font-weight: 400;"> of your security stack. So when you need to ask for more intel, flag an IOC, validate a vendor, or check the status of a CVE, you can do it instantly, without leaving the workflow you’re in.</span></p>
<p><b><span style="font-weight: 400;">This is the power of Polarity — and the RFI integration brings collaboration directly into that overlay.</span></b></p>
<h3>What Makes Polarity Different</h3>
<p><span style="font-weight: 400;">Most tools promise “better visibility.” Polarity delivers something deeper: real-time context wherever you work. Polarity overlays intelligence into any tool. From browsers to SIEMs to ticketing systems, Polarity functions like Ctrl+F for your entire security stack, but with more precision and intelligence. </span></p>
<p><span style="text-decoration: underline;">Core Capabilities</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Computer vision:</b><span style="font-weight: 400;"> Optical Character Recognition (OCR) recognizes indicators and keywords in any window — no API, no setup.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Federated search across 150+ tools:</b><span style="font-weight: 400;"> Highlight any text and instantly see related context from across your environment.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>AI summaries and enrichment scoring:</b><span style="font-weight: 400;"> Polarity Assistant — powered by Azure OpenAI — explains threats, identifies priorities, and suggests next steps.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>One-click actions:</b><span style="font-weight: 400;"> Share intel, annotate findings, or trigger workflows right from the overlay.</span></li>
</ul>
<p><span style="text-decoration: underline;">Proven Impact</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Investigation time reduced by 300%.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">One customer cut IR time from 7 hours to 37 minutes.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Significant decreases in false positives and alert fatigue.</span></li>
</ul>
<p><span style="font-weight: 400;">Polarity doesn’t require integration. It simply </span><i><span style="font-weight: 400;">sees</span></i><span style="font-weight: 400;"> what’s on your screen and gives you the intelligence you need — wherever you are.</span></p>
<h3><strong>Introducing the RFI Integration: Collaboration Without Friction</strong></h3>
<p><span style="font-weight: 400;">RFIs are the connective tissue between teams — intel, IR, vulnerability management, procurement, HR, legal, and more. But traditionally, RFIs are slow and manual. Analysts must pause their investigation, switch tools, gather context, write out detailed requests, and hope they reach the right team.</span></p>
<p><span style="font-weight: 400;">With Polarity’s RFI integration, users can: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Send an RFI from any screen</b><span style="font-weight: 400;"> — highlight text, right-click, or use the Polarity overlay.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Configure what the UI looks like</b><span style="font-weight: 400;"> — dropdown menus, buttons, or even a fully invisible workflow.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Route RFIs however you want</b><span style="font-weight: 400;"> — email, Jira, ServiceNow, or custom workflows.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Customize submission flows per use case</b><span style="font-weight: 400;"> — intel requests, CVE validation, vendor checks, HR inquiries, etc.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Layer in AI automation</b><span style="font-weight: 400;"> — generate tasks, run scans, summarize intel, or gather data automatically.</span></li>
</ul>
<p><span style="font-weight: 400;">RFIs transform from manual overhead to a single effortless action performed in-context.</span></p>
<h3><strong>Real-World Use Cases Across Security and Operations</strong></h3>
<p><span style="font-weight: 400;">This integration isn’t just a nice-to-have. It solves real workflow challenges for key security roles — from threat intel to incident response.</span></p>
<p><span style="text-decoration: underline;"><span style="font-weight: 400;">Threat Intel Collaboration</span></span></p>
<p><b>Scenario:</b><span style="font-weight: 400;"> Analyst highlights an IP address or threat actor name.</span></p>
<p><b>What happens next:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Polarity auto-enriches it with context from ThreatConnect and 150+ other sources.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Analyst sends an RFI to CTI with one click.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">CTI can respond instantly — no email threads, no lost context, no copy/paste.</span></li>
</ul>
<p><b>Value:</b><span style="font-weight: 400;"> More accurate intelligence, faster cross-team coordination, zero workflow disruption.</span></p>
<p><span style="text-decoration: underline;"><span style="font-weight: 400;">Vulnerability Management</span></span></p>
<p><b>Scenario:</b><span style="font-weight: 400;"> A vulnerability assessor spots a new CVE (common vulnerability and exposure).</span></p>
<p><b>What Polarity does automatically:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Surfaces exploit status, enrichment scoring, and CAL<img src="https://s.w.org/images/core/emoji/17.0.2/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> context.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">One-click RFI triggers a scan across the environment or kicks off the VM workflow.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Automatically routes to Jira/ServiceNow with all fields pre-populated.</span></li>
</ul>
<p><b>Value:</b><span style="font-weight: 400;"> Faster patching, better prioritization, immediate alignment between vuln, IR, and IT teams.</span></p>
<p><span style="text-decoration: underline;"><span style="font-weight: 400;">Incident Response</span></span></p>
<p><b>Scenario:</b><span style="font-weight: 400;"> Responder sees an unfamiliar IOC (Indicator of Compromise) in an alert.</span></p>
<p><b>Polarity instantly:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enriches the IOC inline using AI summarization.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Suggests risk score and next steps.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">RFI sends a request to IR leadership or CTI for validation or escalation.</span></li>
</ul>
<p><b>Value:</b><span style="font-weight: 400;"> Moves teams from “alert” to “decision” significantly faster.</span></p>
<p><span style="text-decoration: underline;"><span style="font-weight: 400;">Procurement &amp; Vendor Assessment</span></span></p>
<p><b>Scenario:</b><span style="font-weight: 400;"> Analyst, HR, or legal sees a vendor mentioned in an audit or incident.</span></p>
<p><b>Polarity enables:</b></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Highlight vendor name → send RFI → procurement validates license, relationship, or past issues.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Documentation is automatically created and trackable across teams.</span></li>
</ul>
<p><b>Value:</b><span style="font-weight: 400;"> Cross-functional clarity without time lost to email chains.</span></p>
<h3><strong>Why This Matters: Collaboration That Sticks</strong></h3>
<p><span style="font-weight: 400;">Collaboration often fails because the friction outweighs the value. Switching tools, writing long summaries, re-entering data, or tracking down the right person require too much effort to be worthwhile.</span></p>
<p><span style="font-weight: 400;">Polarity removes each of these barriers with:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Inline, context-aware actions.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Instant enrichment and federated search.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Auto-routing to the right workflow.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">AI assistance that reduces repetitive work.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Zero duplicate effort across teams.</span></li>
</ul>
<p><span style="font-weight: 400;">The result: collaboration becomes </span><b>effortless</b><span style="font-weight: 400;"> — reducing alert fatigue by filtering low-priority events using enrichment scoring. When collaboration is easy, teams are more likely to engage with each other efficiently and effectively. </span></p>
<h3><strong>Getting Started with Polarity</strong></h3>
<p><a href="https://threatconnect.com/polarity-by-threatconnect/"><span style="font-weight: 400;">Polarity by ThreatConnect</span></a><span style="font-weight: 400;"> is easy to deploy and adopt — providing instant value: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Works across </span><b>100% of tools on Windows, Mac, and Linux.</b></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Connects to </span><b>150+ data sources.</b></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Cloud or on-prem deployment.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Out-of-the-box email support.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Optional ticketing integrations.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Day-one value with AI-assisted context and RFI workflows.</span></li>
</ul>
<p><span style="font-weight: 400;">Ready to see it in action? </span><a href="https://threatconnect.com/request-a-demo/"><span style="font-weight: 400;">Book a demo</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://threatconnect.com/blog/empower-seamless-collaboration-with-polaritys-rfi-integration/">Empower Seamless Collaboration with Polarity’s RFI Integration</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CAL, MITRE v18 &#038; MITRE ATLAS: The Map I Wish I Had in the SOC</title>
		<link>https://threatconnect.com/blog/cal-mitre-v18-mitre-atlas-the-map-i-wish-i-had-in-the-soc/</link>
		
		<dc:creator><![CDATA[Courtney Furey]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 14:00:02 +0000</pubDate>
				<category><![CDATA[Collective Analytics Layer (CAL)]]></category>
		<guid isPermaLink="false">https://threatconnect.com/?p=20589</guid>

					<description><![CDATA[<p>The map I wish I had in the SOC I remember a Thursday night at a previous SOC position in FinTech. The alert queue spiked during a credential stuffing incident, and our team had to scramble to keep up with the influx of alerts. We had a SIEM, a SOAR, and a handful of open-source [&#8230;]</p>
<p>The post <a href="https://threatconnect.com/blog/cal-mitre-v18-mitre-atlas-the-map-i-wish-i-had-in-the-soc/">CAL, MITRE v18 &#038; MITRE ATLAS: The Map I Wish I Had in the SOC</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><b>The map I wish I had in the SOC</b></h3>
<p><span style="font-weight: 400;">I remember a Thursday night at a previous SOC position in FinTech. The alert queue spiked during a credential stuffing incident, and our team had to scramble to keep up with the influx of alerts. We had a SIEM, a SOAR, and a handful of open-source IOCs we continuously retrieved via Google and other search engines. Each analyst grabbed a ticket and went hunting alone, starting their own process from scratch. We could isolate hosts, block domains, and re-image servers, but it was difficult to see the whole picture as we sorted through mountains of data and noise. Speed was the metric that mattered. I knew we were missing critical patterns, but I couldn’t see them or communicate what I thought we might be missing. We were moving fast, but we were still relatively blind. </span></p>
<p><span style="font-weight: 400;">Back then, our obstacle wasn’t just the attackers; it was the lack of structure. Our workflows and systems were not supporting each other, creating additional friction. We had no shared language. One teammate would call something a credential dump; another would describe a suspicious PowerShell script. Both were correct, but neither description connected to a consistent technique or pattern. Our triage lived in chat threads, ticket notes, and half-finished handoff docs. Behavior was rarely carried from one incident to the next. We spent hours digging through logs for clues we had already seen in previous incidents, but had no way to link them. Looking back, we weren’t struggling because the attacks were sophisticated; we were struggling because our system wasn’t leveraging pre-established standards and enrichment that would have focused our attention and communications.</span></p>
<h3><b>Finding True North in Adversary Behavior</b></h3>
<p><span style="font-weight: 400;">Now, I’m a different type of analyst. I research and help design products that help scale SOC and CTI teams via the Collective Analytic Layer (CAL) at Dataminr. CAL is a global intelligence engine with a mission to transform insights into action, embedded throughout ThreatConnect and Polarity to aid analysts throughout the CTI lifecycle.  Now, I can see exactly what was missing in that SOC: A shared intelligence layer that would help our data speak the same language. We needed a living memory, something that linked indicators, patterns, and past activities together, rather than leaving us to reconstruct everything manually. These problems hit home for me as I watched </span><a href="https://mitre.brandlive.com/MITRE-ATTACKcon-6-0/en/home" target="_blank" rel="noopener"><span style="font-weight: 400;">MITRE ATT&amp;CKcon 6.0</span></a><span style="font-weight: 400;">. Red Canary highlighted that out of nearly 400 ATT&amp;CK techniques, a small group of approximately 30 were </span><a href="https://redcanary.com/threat-detection-report/techniques/" target="_blank" rel="noopener"><span style="font-weight: 400;">“forever techniques”</span></a><span style="font-weight: 400;"> that account for the majority of detections. Novel attacks happen, but they’re rare. Most adversaries rely on the same behavioral building blocks repeatedly. That single insight reframed my years in the SOC. We could have been using established tools and practices to make our work so much easier.</span></p>
<h3><span style="font-weight: 400;">ATT&amp;CK as the Compass, CAL as the GPS</span></h3>
<p><span style="font-weight: 400;">CAL has </span><a href="https://knowledge.threatconnect.com/docs/cal-3-14-release-notes" target="_blank" rel="noopener"><span style="font-weight: 400;">updated to leverage the latest MITRE ATT&amp;CK Enterprise version 18.</span></a><span style="font-weight: 400;"> This </span><a href="https://attack.mitre.org/resources/updates/updates-october-2025/" target="_blank" rel="noopener"><span style="font-weight: 400;">version</span></a><span style="font-weight: 400;"> brings a more transparent structure for describing adversary behavior. Refining tactic categories and grounding updates in what defenders can actually observe across systems provides analysts with a more accurate shared language. The split of “Defense Evasion” into Stealth and Impair Defenses, for example, helps teams distinguish whether an adversary is hiding or actively degrading protections. This was something that used to blur together in my old SOC work. New sub-techniques, such as Python startup hooks, software discovery, and time-based evasion, continue the trend of modeling behaviors in a way that allows analysts to map back to telemetry, not just attacker intention reliably.</span></p>
<p><span style="font-weight: 400;">CAL takes that clarity and makes it operational. Instead of ATT&amp;CK coverage living in slide decks or internal wikis, CAL applies it automatically to incoming news about breaches and attacks, connecting adversaries to behaviors, and placing isolated artifacts into a broader narrative. ThreatConnect enables quick visualization through ATT&amp;CK visualization and adversary dashboards, which display trends and anomalies, providing a clear view of potential threats. Analysts can quickly apply </span><a href="https://knowledge.threatconnect.com/docs/attack-tags" target="_blank" rel="noopener"><span style="font-weight: 400;">ATT&amp;CK tags</span></a><span style="font-weight: 400;"> to indicators, ensuring their communication remains aligned with the specific context of investigations. </span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-20591 aligncenter" src="https://threatconnect.com/wp-content/uploads/2025/12/blog-2-1024x532.png" alt="" width="987" height="513" srcset="https://threatconnect.com/wp-content/uploads/2025/12/blog-2-1024x532.png 1024w, https://threatconnect.com/wp-content/uploads/2025/12/blog-2-300x156.png 300w, https://threatconnect.com/wp-content/uploads/2025/12/blog-2-768x399.png 768w, https://threatconnect.com/wp-content/uploads/2025/12/blog-2-1536x799.png 1536w, https://threatconnect.com/wp-content/uploads/2025/12/blog-2.png 1600w" sizes="auto, (max-width: 987px) 100vw, 987px" /></p>
<p><span style="font-weight: 400;">In Polarity, analysts can utilize the </span><a href="https://threatconnect.com/resource/threatconnect-cal-integration-with-polarity/" target="_blank" rel="noopener"><span style="font-weight: 400;">CAL Integration</span></a><span style="font-weight: 400;"> to quickly reference MITRE ATT&amp;CK Techniques while reviewing reports or conducting investigations.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-20592 aligncenter" src="https://threatconnect.com/wp-content/uploads/2025/12/blog-1-749x1024.png" alt="" width="472" height="645" srcset="https://threatconnect.com/wp-content/uploads/2025/12/blog-1-749x1024.png 749w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1-219x300.png 219w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1-768x1050.png 768w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1-1123x1536.png 1123w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1.png 1170w" sizes="auto, (max-width: 472px) 100vw, 472px" /></p>
<p><span style="font-weight: 400;">While ATT&amp;CK Enterprise focuses on traditional systems, </span><a href="https://atlas.mitre.org/" target="_blank" rel="noopener"><span style="font-weight: 400;">MITRE ATLAS</span></a><span style="font-weight: 400;"> focuses on AI-enabled ones. AI is increasingly embedded in automation, decision support, and internal workflows. That means adversaries now attempt to poison models, manipulate prompts, and exploit integration points in AI pipelines. ATLAS documents these real-world and simulated attacks, forming a knowledge base for AI red teaming and defensive planning. Importantly, ATLAS aligns with ATT&amp;CK. This alignment enables CAL to correlate AI-targeted behaviors with traditional techniques, providing analysts with a unified understanding of both. With </span><a href="https://knowledge.threatconnect.com/docs/cal-3-14-release-notes" target="_blank" rel="noopener"><span style="font-weight: 400;">CAL’s latest 3.14 release,</span></a><span style="font-weight: 400;"> analysts will get more automation to help them extract and leverage ATLAS tactics and techniques.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-20593 aligncenter" src="https://threatconnect.com/wp-content/uploads/2025/12/blog-3-1024x881.png" alt="" width="581" height="500" srcset="https://threatconnect.com/wp-content/uploads/2025/12/blog-3-1024x881.png 1024w, https://threatconnect.com/wp-content/uploads/2025/12/blog-3-300x258.png 300w, https://threatconnect.com/wp-content/uploads/2025/12/blog-3-768x660.png 768w, https://threatconnect.com/wp-content/uploads/2025/12/blog-3-1536x1321.png 1536w, https://threatconnect.com/wp-content/uploads/2025/12/blog-3.png 1600w" sizes="auto, (max-width: 581px) 100vw, 581px" /></p>
<h3><strong>When Indicators Stopped Being Uncharted Territory</strong></h3>
<p><span style="font-weight: 400;">Indicator investigations in my old SOC felt like detective work of scattered feeds, inconsistent metadata, and hours spent deciding whether an IP, hash, or domain was worth our time. </span><a href="https://knowledge.threatconnect.com/docs/cal-indicator-enrichments" target="_blank" rel="noopener"><span style="font-weight: 400;">CAL Enrichment</span></a><span style="font-weight: 400;"> changes that by unifying intelligence from OSINT, proprietary feeds, analytics, and community signals into a single, unified view. Analysts instantly see observations, scoring, impressions, false positive reports, feed visibility, known-good status, classifiers, and behavioral metadata all in one place. </span><a href="https://knowledge.threatconnect.com/docs/cal-classifiers" target="_blank" rel="noopener"><span style="font-weight: 400;">CAL’s classifier ecosystem</span></a><span style="font-weight: 400;"> is powered by analytics, heuristics, and machine-learning models, adding another layer that labels indicators with threat-relevant categories to help analysts quickly understand behavior and intent.  Even routine details, such as ASN mappings, cloud provider ranges, file metadata, or hash relationships, are automatically resolved, eliminating ambiguity and allowing analysts to focus on what matters. </span></p>
<div style="display: flex; justify-content: center; align-items: flex-start;"><img loading="lazy" decoding="async" class="wp-image-20594" style="margin-right: 10px;" src="https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0-155x300.png" alt="First image description" width="222" height="429" srcset="https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0-155x300.png 155w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0-531x1024.png 531w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0-768x1482.png 768w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0-796x1536.png 796w, https://threatconnect.com/wp-content/uploads/2025/12/blog-1.0.png 829w" sizes="auto, (max-width: 222px) 100vw, 222px" /><br />
<img loading="lazy" decoding="async" class="wp-image-20595" src="https://threatconnect.com/wp-content/uploads/2025/12/blog-143x300.png" alt="Second image description" width="205" height="430" srcset="https://threatconnect.com/wp-content/uploads/2025/12/blog-143x300.png 143w, https://threatconnect.com/wp-content/uploads/2025/12/blog-734x1536.png 734w, https://threatconnect.com/wp-content/uploads/2025/12/blog.png 765w" sizes="auto, (max-width: 205px) 100vw, 205px" /></div>
<h3></h3>
<h3><b>CAL Would Have Saved Us So Many Wrong Turns</b></h3>
<p><span style="font-weight: 400;">Had we had access to CAL in ThreatConnect or Polarity, those long, chaotic nights would have been far more manageable. Alerts could be quickly mapped to ATT&amp;CK techniques, linked to past incidents, enriched with global intelligence, and placed in broader behavioral patterns. Within five minutes, we would know not only what triggered it, but also why it mattered, whether the indicator had been seen elsewhere, its reputation, and what typically follows based on real-world behavior.</span></p>
<p><span style="font-weight: 400;">CAL removes the isolation we faced. Polarity lookups and ThreatConnect intel make research that once took hours available in seconds. Automated feed visibility, false-positive reporting, classifier context, and community signals provide instant clarity. Domains are instantly flagged for DGA patterns, hashes are linked to file families, and IPs are quickly identified as benign or suspicious. Behaviorally, scripts tied to T1059.003 no longer stand alone—CAL connects them to kill chain activity we previously missed. Shared technique tags align IR, CTI, and SOC workflows, while prevalence data highlights the behaviors that adversaries use most frequently.</span></p>
<h3><b>Finally, a Map That Leads to Answers</b></h3>
<p><span style="font-weight: 400;">This matters because defenders don’t just need more information; they need empowerment through reliable best practices. Looking back, much of the stress in my old SOC role came not from the threats themselves, but from the lack of structure around them. CAL provides the collective memory we were missing, while ATT&amp;CK v18 and ATLAS supply a shared grammar that prepares teams for everything from today’s intrusion techniques to tomorrow’s AI-driven attacks. Together, embedded throughout ThreatConnect and Polarity, they transform SOC alerts from isolated events into meaningful stories, providing analysts with a more straightforward, more confident path from detection to action.</span></p>
<p>The post <a href="https://threatconnect.com/blog/cal-mitre-v18-mitre-atlas-the-map-i-wish-i-had-in-the-soc/">CAL, MITRE v18 &#038; MITRE ATLAS: The Map I Wish I Had in the SOC</a> appeared first on <a href="https://threatconnect.com">ThreatConnect</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
